CN107102881A - Configuring management method and device for end application - Google Patents

Configuring management method and device for end application Download PDF

Info

Publication number
CN107102881A
CN107102881A CN201710355902.0A CN201710355902A CN107102881A CN 107102881 A CN107102881 A CN 107102881A CN 201710355902 A CN201710355902 A CN 201710355902A CN 107102881 A CN107102881 A CN 107102881A
Authority
CN
China
Prior art keywords
allocation plan
input information
external input
equations
authentication grade
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710355902.0A
Other languages
Chinese (zh)
Inventor
王迅
戴卓铭
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Green Orange Industry Co Ltd
Original Assignee
Shanghai Green Orange Industry Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Green Orange Industry Co Ltd filed Critical Shanghai Green Orange Industry Co Ltd
Priority to CN201710355902.0A priority Critical patent/CN107102881A/en
Publication of CN107102881A publication Critical patent/CN107102881A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/445Program loading or initiating
    • G06F9/44505Configuring for program initiating, e.g. using registry, configuration files
    • G06F9/4451User profiles; Roaming

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The present invention provides a kind of configuring management method and device for end application.Method includes:Obtain the first external input information;According to first external input information, application program is determined from least two allocation plans to be selected is currently configured scheme;The configuration item for running the application program is configured according to the scheme that is currently configured.Realize the quick obtaining of allocation plan under different demands.The configuration item for running application program is configured according to the scheme that is currently configured of determination, the setting efficiency to application program configuration item is improved, improves the experience of user.

Description

Configuring management method and device for end application
Technical field
The present embodiments relate to field of computer technology, more particularly to a kind of configuration management for end application Method and apparatus.
Background technology
With flourishing for the smart machines such as smart mobile phone, tablet personal computer, increasingly abundanter application enters people Daily life in.
Existing smart machine operating system is that application program has opened the configuration item that much can customize, if but air exercise The application program management opened is improper, then can solicited message leakage, electric quantity consumption exception, system operation interim card etc. are many asks Topic.Therefore, many producers by custom-configuring function to user's open applications program in an operating system to adapt to different use The configuration management demand at family.
However, in current application program custom-configures function, user needs pair when requiring different allocation plans Multiple configuration items are configured modification respectively.This configuration mode is very numerous and diverse and scattered, user often probably due to carelessness or Some wrong settings of person cause application program some functions during normal use to become unavailable.Existing application management Tactful Consumer's Experience is not good.
The content of the invention
The invention provides a kind of configuring management method for end application, including:
Obtain the first external input information;
According to first external input information, determine that the current of application program is matched somebody with somebody from least two allocation plans to be selected Put scheme;
The configuration item for running the application program is configured according to the scheme that is currently configured.
Further, described according to first external input information, being determined from least two allocation plans to be selected should With being currently configured before scheme for program, in addition to:
According to the second external input information, the allocation plan to be selected is generated.
Further, before the first external input information of the acquisition, in addition to:
The 3rd external input information is detected, is authenticated according to the 3rd external input information;
If authentification failure, the allocation plan to be selected is used as using the first kind allocation plan that prestores;
If certification success, the allocation plan to be selected is used as using the Equations of The Second Kind allocation plan that prestores.
Further, the Equations of The Second Kind allocation plan is grouped including at least two Equations of The Second Kind allocation plans, and described second Class allocation plan packet association corresponding with authentication grade;
It is described using the Equations of The Second Kind allocation plan that prestores as the allocation plan to be selected, including:
Authentication grade is determined according to the 3rd external input information;
The allocation plan to be selected is used as using the corresponding Equations of The Second Kind allocation plan packet of the authentication grade that prestores.
Further, the Equations of The Second Kind allocation plan is grouped including at least two Equations of The Second Kind allocation plans, and described second Class allocation plan packet association corresponding with authentication grade;
It is described using the Equations of The Second Kind allocation plan that prestores as the allocation plan to be selected, including:
First authentication grade and the second authentication grade are determined according to the 3rd external input information;
The second authentication grade correspondence is obtained from the corresponding Equations of The Second Kind allocation plan packet of first authentication grade Equations of The Second Kind allocation plan packet be used as the allocation plan to be selected.
Further, the 3rd external input information of the detection, including:Detected by following at least one modes outside the 3rd Portion inputs information:
Speech detection;
Image detection;
Motion detection.
Present invention also offers a kind of configuration management device for end application, including:
Acquisition module, for obtaining the first external input information;
Processing module, for according to first external input information, being determined from least two allocation plans to be selected should Scheme is currently configured with program;
Configuration module, is configured for being currently configured scheme according to the configuration item for starting the application program.
Further, the processing module is additionally operable to, according to the second external input information, generate the allocation plan to be selected.
Further, in addition to:
Authentication module, for detecting the 3rd external input information, is authenticated according to the 3rd external input information;If Authentification failure, the processing module using the first kind allocation plan that prestores specifically for being used as the allocation plan to be selected;If recognizing Demonstrate,prove successfully, the processing module using the Equations of The Second Kind allocation plan that prestores specifically for being used as the allocation plan to be selected.
Further, the Equations of The Second Kind allocation plan is grouped including at least two Equations of The Second Kind allocation plans, and described second Class allocation plan packet association corresponding with authentication grade;
The authentication module according to the 3rd external input information specifically for determining authentication grade;The processing module Specifically for being used as the allocation plan to be selected using the corresponding Equations of The Second Kind allocation plan packet of the authentication grade that prestores.
The present invention applies journey by according to first external input information, being determined from least two allocation plans to be selected Sequence is currently configured scheme;The configuration item for running the application program is configured according to the scheme that is currently configured, realized The quick obtaining of allocation plan under different demands.The configuration item for running application program is carried out according to the scheme that is currently configured of determination Configuration, improves the setting efficiency to application program configuration item, improves the experience of user.
Brief description of the drawings
In order to illustrate more clearly about the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing There is the accompanying drawing used required in technology description to be briefly described, it should be apparent that, drawings in the following description are this hairs Some bright embodiments, for those of ordinary skill in the art, without having to pay creative labor, can be with Other accompanying drawings are obtained according to these accompanying drawings.
A kind of flow charts of the Fig. 1 for the present invention for the configuring management method of end application;
Fig. 2 includes a kind of stream for generating allocation plan to be selected for the present invention for the configuring management method of end application Cheng Tu;
Fig. 3 includes a kind of flow chart of certification for the present invention for the configuring management method of end application;
Fig. 4 is that a kind of implementation of the allocation plan to be selected is used as using the Equations of The Second Kind allocation plan that prestores in Fig. 3;
Fig. 5 is that another implementation of the allocation plan to be selected is used as using the Equations of The Second Kind allocation plan that prestores in Fig. 3.
Embodiment
To make the purpose, technical scheme and advantage of the embodiment of the present invention clearer, below in conjunction with the embodiment of the present invention In accompanying drawing, the technical scheme in the embodiment of the present invention is clearly and completely described, it is clear that described embodiment is A part of embodiment of the present invention, rather than whole embodiments.Based on the embodiment in the present invention, those of ordinary skill in the art The every other embodiment obtained under the premise of creative work is not made, belongs to the scope of protection of the invention.
A kind of flow charts of the Fig. 1 for the present invention for the configuring management method of end application.As shown in figure 1, being originally The method of embodiment can include:
S110, obtains the first external input information;
S120, according to first external input information, determines application program from least two allocation plans to be selected It is currently configured scheme;
S130, is configured according to the scheme that is currently configured to the configuration item for running the application program.
The first external input information obtained in step S110 shown in Fig. 1 is to be used to treat in step S120 at least two Arrangement scheme carries out the information of selection, and first external input information is by way of including but is not limited to following at least one Obtain:
Recognize that the point of touch area on touch-screen touches to make or glide direction acquisition;
Recognize the semantic acquisition in voice messaging.
Allocation plan to be selected is at least two in step S120 shown in Fig. 1, by being carried out to existing optional program Selection, realizes the quick obtaining of allocation plan under different demands.Scheme is currently configured to operation according to what is determined in step S120 The configuration item of application program is configured, and is improved the setting efficiency to application program configuration item, is improved the experience of user.
Method shown in described Fig. 1 can be every time open application program when carry out, for example detect need start Step S110-S130 is proceeded by after the instruction of application program, is opened after step S130 configurations are finished with amended configuration item Move and run the operation program.Thus the demand configured before application program starts every time to application program is met.
Method shown in described Fig. 1 can also be to be carried out during application program is run, for example, detecting needs Step S110-S130 is proceeded by after the instruction for changing application program configuration item, after after step S130 configurations are finished with modification Configuration item continue to run with the operation program.Thus meet application program is configured in application program running Demand.
Fig. 2 includes a kind of stream for generating allocation plan to be selected for the present invention for the configuring management method of end application Cheng Tu.
As shown in Fig. 2 before step S110, in addition to step S210, according to the second external input information, generation is described Allocation plan to be selected.
Specifically, the second external input information in step S210 is the information for generating allocation plan to be selected.User Formulated according to different demands and increase allocation plan to be selected, the embodiment shown in Fig. 2 can provide for user person writes from memory with supplier Recognize the different conceptual design requirement of scheme.A kind of implementation of embodiment shown in Fig. 2 can be that system ejection sets to be selected The dialog box of allocation plan, user sets in the dialog box for setting allocation plan to be selected to every configuration item of application program Put.
In a kind of embodiment that method shown in Fig. 2 is applied to mobile phone terminal, a kind of allocation plan to be selected that user is set Can be " to prohibit the use of GPRS flows, allow to obtain current address, allow camera access authority, allow microphone access right Limit ".User clicks on " confirmation " after setting completed, and cell phone system generates the allocation plan to be selected and preserved.Treating arrangement side User can also treat the name of arrangement scheme during case is set, for example, be named as above-mentioned allocation plan to be selected " outdoor Usage scenario ".User, will be entitled comprising this at least two allocation plans to be selected got when entering step S220 The allocation plan to be selected of " outdoor usage scenario ".User multiple allocation plans to be selected can be set according to a variety of use demands in case It is subsequently selected.
On the basis of embodiment illustrated in fig. 1, further, before S110, S301- can also be comprised the following steps S303, as shown in figure 3, Fig. 3 includes a kind of flow chart of certification for the present invention for the configuring management method of end application:
S301, detects the 3rd external input information, is authenticated according to the 3rd external input information.
S302, if authentification failure, the allocation plan to be selected is used as using the first kind allocation plan that prestores.
S303:If certification success, the allocation plan to be selected is used as using the Equations of The Second Kind allocation plan that prestores.
The step of three external input information of the detection, it is chosen as needing to change application program configuration item detecting Detected in an authenticated time after instruction, be also chosen as the certification after the instruction for needing startup application program is detected Detected in time.If not detecting effective information in the authenticated time, directly it is judged as authentification failure.It is described S302 and S303 is corresponding subsequent step under two kinds of different authentication results, should not limit S302's and S303 with its Digital size Sequencing.
Table 1 is a kind of optional embodiment of first kind allocation plan and Equations of The Second Kind allocation plan of the present invention.
Alternatively, the access right of the first kind allocation plan is less than the access right of the Equations of The Second Kind allocation plan. For example first kind allocation plan A is chosen as in the illustrated embodiment of table 1:
A1 " prohibits the use of GPRS flows, forbids obtaining current address, forbid camera access authority, forbid microphone to access Authority, forbid backstage refresh, forbid open bluetooth ",
With, A2 " GPRS flows are prohibitted the use of, forbids obtaining current address, forbids camera access authority, forbids microphone to visit Authority is asked, allows backstage to refresh, forbid opening bluetooth ";
Equations of The Second Kind allocation plan B is chosen as:
B1 " allows using GPRS flows, allows to obtain current address, forbids camera access authority, forbids microphone to access Authority, permission backstage refresh, allow to open bluetooth ",
" allow using GPRS flows with, B2, allow to obtain current address, allow camera access authority, allow microphone to visit Authority is asked, allows backstage to refresh, allow to open bluetooth ".
Table 1
The allocation plan to be selected of different rights is got according to the result of certification, same terminal is used available for multiple users The embodiment of equipment, can be used for the embodiment of same user's different choice mode.
In embodiment of multiple users using same terminal device, the method shown in Fig. 3 is directed to stranger and keeper Give different access rights.For the stranger of authentification failure, only the first kind as shown in A1, A2 in table 1 can be used to match somebody with somebody Put scheme;For the successful keeper of certification, the Equations of The Second Kind allocation plan as shown in B1, B2 in table 1 can be used.It is possible thereby to Reduce the possibility of terminal device information leakage.
In the embodiment of same user's different choice mode, user can need to limit application program access right In the case of realized by authentification failure.For example when parent needs the learning software on tablet personal computer being supplied to child resistant, The result failed by using the authentication mode access authentication of mistake, and the configuration in first kind allocation plan in selection table 1 Option A 2, thus limiting child seeing a film during using application program, play the access rights of the amusement functions such as game.By This can be in order to user under different scenes use requirement.
The allocation plan to be selected is used as using the Equations of The Second Kind allocation plan that prestores described in S303 in embodiment shown in Fig. 3 At least include but is not limited to following two implementations:
On the basis of embodiment illustrated in fig. 3, the Equations of The Second Kind allocation plan includes at least two Equations of The Second Kind allocation plans Packet, and Equations of The Second Kind allocation plan packet association corresponding with authentication grade.Wherein, step S303 a kind of possible realization Side as shown in figure 4, including
S4021, authentication grade is determined according to the 3rd external input information;
S4022, arrangement side is treated using the corresponding Equations of The Second Kind allocation plan packet of the authentication grade that prestores described in Case.
Embodiment shown in Fig. 4 is further finely divided with authentication grade to Equations of The Second Kind allocation plan, is used available for multiple Family uses the embodiment of same terminal device, can be used for the embodiment of same user's different choice mode.
Table 2 is a kind of optional Equations of The Second Kind allocation plan packet embodiment of the present invention.Same terminal is used in multiple users In the embodiment of equipment, thus the multiple keepers of multiple authentication grade correspondences provide identical or different for different administrative staff Allocation plan to be selected.Equations of The Second Kind allocation plan B is grouped B1 and the comprising Equations of The Second Kind allocation plan for example in the illustrated embodiment of table 2 Two class allocation plans are grouped B2.At least include two allocation plans again in the packet of each Equations of The Second Kind allocation plan.
If the authentication grade correspondence Equations of The Second Kind allocation plan packet B1 of user, using allocation plan B11, B12 as described Allocation plan to be selected.Wherein allocation plan B11 is specially:Forbid accessing database 1, allow bearing data storehouse 2, allow in application The operation of data is changed in program, allows the operation of output data in the application and allows to carry out network in the application Connection.
Table 2
Embodiment as shown in table 2 is applied at least two implementations:
One kind is achieved in that:The keeper of the different authentication grade to be selected allocation plan different by obtaining is answered same With the different database of routine access, the use requirement of different user is realized.
It is another to be achieved in that:Same keeper obtains different allocation plans to be selected by different authentication grades, Realize the use requirement under the different usage scenarios of same user.
In embodiment illustrated in fig. 4, it is described according to the 3rd external input information determine the method for authentication grade include but It is not limited to the implementation that table 3, table 4, table 5 are respectively shown in.
In implementation as shown in Table 3 and Table 4, according to the type of the identification object of the 3rd external input information Determine authentication grade.
Table 3 is a kind of optional authentication grade of the present invention and the type corresponding relation of identification object.
As shown in table 3, the type of the identification object of the 3rd external input information is divided into voice, image and action, root Authentication grade is determined according to the type difference of identification object.The type of identification object shown in table 3 can be simply by obtaining institute The sensor of the 3rd external input information is stated to determine:Microphone correspondence voice class, camera correspondence image class, touch-screen correspondence Act class.Sensor according to the 3rd external input information is obtained can quickly determine the identification of the 3rd external input information The type of object.In the implementation shown in table 3, it will act that the corresponding authentication grade B3 of class is default to be set to highest certification etc. Level.Therefore by acting during the success of class access authentication, the allocation plan to be selected for accessing top secret data base authority can be obtained.
Table 3
Authentication grade The type of identification object
B1 Voice class
B2 Image class
B3 Act class
Table 4 is the optional another authentication grade of the present invention and the type corresponding relation of identification object.
As shown in table 4, the type of the identification object of the 3rd external input information is divided into fingerprint recognition class, recognition of face Class and iris recognition class, authentication grade is determined according to the type of identification object difference.Due to fingerprint image, facial image and rainbow The characteristics of image of film image has obvious difference, therefore the illustrated embodiment of table 4 is according to the 3rd external input information of acquisition Characteristics of image determine the type of identification object.In implementation shown in table 4, alternatively by the corresponding certification of fingerprint recognition class Grade B1 is default to be set to highest authentication grade.When therefore by the success of fingerprint recognition type access authentication, access can be obtained most The allocation plan to be selected of high confidential data storehouse authority.
Table 4
Authentication grade The type of identification object
B1 Fingerprint recognition class
B2 Recognition of face class
B3 Iris recognition class
Table 5 is another optional authentication grade of the present invention and the type corresponding relation of identification object.As shown in table 5 In implementation, authentication grade is determined according to the content of the identification object of the 3rd external input information.
As shown in table 5, the content " A001 ", " B001 " and " C001 " of the identification object of the 3rd external input information is all It is that can authenticate successful password, but different passwords have corresponded to different authentication grades.
Acquisition modes of the implementation not to password shown in table 5 make a distinction.For example in three times certifications pass through respectively It is " C001 " the 3rd external input information that fingerprint image, facial image or iris image identification, which obtain content, all corresponds to certification etc. Level B3.In implementation shown in table 5, alternatively " A001 " corresponding authentication grade B1 is preset and is set to highest authentication grade. When therefore being succeeded by either type input content for the 3rd external input information access authentication of " A001 ", it can be accessed The allocation plan to be selected of top secret data base authority.
Table 5
Authentication grade The content of identification object
B1 A001
B2 B001
B3 C001
Another implementation that Fig. 5 is step S303 in the improvement on the basis of embodiment illustrated in fig. 3, in particular Fig. 3. Table 6 is a kind of optional embodiment of first authentication grade and the second authentication grade of the present invention.
In embodiment as shown in Fig. 5 and table 6, the Equations of The Second Kind allocation plan include Equations of The Second Kind allocation plan packet C11, C12, C21, C22, and Equations of The Second Kind allocation plan packet association corresponding with authentication grade.
It is described using the Equations of The Second Kind allocation plan that prestores as the allocation plan to be selected, including:
Step S5021, the first authentication grade and the second authentication grade are determined according to the 3rd external input information;
Step S5022, obtains described second in being grouped from the corresponding Equations of The Second Kind allocation plan of first authentication grade and recognizes The corresponding Equations of The Second Kind allocation plan packet of card grade is used as the allocation plan to be selected.
In the implementation shown in Fig. 5 and table 6, if user inputs the 3rd outside input in the way of fingerprint recognition Information, and the 3rd external input information correspondence password " A001 ", then,
As shown in table 6, first according to the type " fingerprint recognition class " of the 3rd external input information identification object, it is determined that First authentication grade is R11;According to the content " A001 " of the 3rd external input information identification object, second certification etc. is determined Level is C11;
The corresponding Equations of The Second Kind allocation plan packets of second authentication grade R21 in first authentication grade R11 are obtained by the correspondence of table 6 For C11.
Table 6
The 3rd external input information is detected in the step S301 as described in Fig. 3-5, including:Examined by following at least one modes Survey the 3rd external input information:
Speech detection, speech detection further comprise but be not limited to semantic information detection, volume detection, tone color detection and/ Or pitch detection.
Image detection, image detection further comprises but is not limited to facial features localization, iris feature is detected, fingerprint characteristic Detection, numerical characteristic detection and/or bar code detection.
Motion detection, motion detection further comprises but is not limited to displacement detecting and/or pressure position detection.The present invention is also A kind of configuration management device for end application is provided, as a kind of implementation, including:
Acquisition module, for obtaining the first external input information;
Processing module, for according to first external input information, being determined from least two allocation plans to be selected should Scheme is currently configured with program;
Configuration module, is configured for being currently configured scheme according to the configuration item for starting the application program.
The processing module is additionally operable to, according to the second external input information, generate the allocation plan to be selected.
The configuration management device for end application also includes:
Authentication module, for detecting the 3rd external input information, is authenticated according to the 3rd external input information;If Authentification failure, the processing module using the first kind allocation plan that prestores specifically for being used as the allocation plan to be selected;If recognizing Demonstrate,prove successfully, the processing module using the Equations of The Second Kind allocation plan that prestores specifically for being used as the allocation plan to be selected.
The Equations of The Second Kind allocation plan is grouped including at least two Equations of The Second Kind allocation plans, and the Equations of The Second Kind allocation plan Packet association corresponding with authentication grade;
The authentication module according to the 3rd external input information specifically for determining authentication grade;The processing module Specifically for being used as the allocation plan to be selected using the corresponding Equations of The Second Kind allocation plan packet of the authentication grade that prestores.
Finally it should be noted that:Various embodiments above is merely illustrative of the technical solution of the present invention, rather than its limitations;To the greatest extent The present invention is described in detail with reference to foregoing embodiments for pipe, it will be understood by those within the art that:Its according to The technical scheme described in foregoing embodiments can so be modified, or which part or all technical characteristic are entered Row equivalent substitution;And these modifications or replacement, the essence of appropriate technical solution is departed from various embodiments of the present invention technology The scope of scheme.

Claims (10)

1. a kind of configuring management method for end application, it is characterised in that including:
Obtain the first external input information;
According to first external input information, the side of being currently configured of application program is determined from least two allocation plans to be selected Case;
The configuration item for running the application program is configured according to the scheme that is currently configured.
2. according to the method described in claim 1, it is characterised in that described according to first external input information, from least Being currently configured before scheme for application program is determined in two allocation plans to be selected, in addition to:
According to the second external input information, the allocation plan to be selected is generated.
3. method according to claim 1 or 2, it is characterised in that before the external input information of acquisition first, also wrap Include:
The 3rd external input information is detected, is authenticated according to the 3rd external input information;
If authentification failure, the allocation plan to be selected is used as using the first kind allocation plan that prestores;
If certification success, the allocation plan to be selected is used as using the Equations of The Second Kind allocation plan that prestores.
4. method according to claim 3, it is characterised in that the Equations of The Second Kind allocation plan includes at least two Equations of The Second Kind Allocation plan is grouped, and Equations of The Second Kind allocation plan packet association corresponding with authentication grade;
It is described using the Equations of The Second Kind allocation plan that prestores as the allocation plan to be selected, including:
Authentication grade is determined according to the 3rd external input information;
The allocation plan to be selected is used as using the corresponding Equations of The Second Kind allocation plan packet of the authentication grade that prestores.
5. method according to claim 3, it is characterised in that the Equations of The Second Kind allocation plan includes at least two Equations of The Second Kind Allocation plan is grouped, and Equations of The Second Kind allocation plan packet association corresponding with authentication grade;
It is described using the Equations of The Second Kind allocation plan that prestores as the allocation plan to be selected, including:
First authentication grade and the second authentication grade are determined according to the 3rd external input information;
Second authentication grade corresponding the is obtained from the packet of first authentication grade corresponding Equations of The Second Kind allocation plan The packet of two class allocation plans is used as the allocation plan to be selected.
6. method according to claim 3, it is characterised in that the external input information of detection the 3rd, including:Under State at least one mode and detect the 3rd external input information:
Speech detection;
Image detection;
Motion detection.
7. a kind of configuration management device for end application, it is characterised in that including:
Acquisition module, for obtaining the first external input information;
Processing module, for according to first external input information, determining to apply journey from least two allocation plans to be selected Sequence is currently configured scheme;
Configuration module, is configured for being currently configured scheme according to the configuration item for starting the application program.
8. device according to claim 7, it is characterised in that the processing module is additionally operable to be believed according to the second outside input Breath, generates the allocation plan to be selected.
9. the device according to claim 7 or 8, it is characterised in that also include:
Authentication module, for detecting the 3rd external input information, is authenticated according to the 3rd external input information;If certification Failure, the processing module using the first kind allocation plan that prestores specifically for being used as the allocation plan to be selected;If certification into Work(, the processing module using the Equations of The Second Kind allocation plan that prestores specifically for being used as the allocation plan to be selected.
10. device according to claim 9, it is characterised in that the Equations of The Second Kind allocation plan includes at least two second Class allocation plan is grouped, and Equations of The Second Kind allocation plan packet association corresponding with authentication grade;
The authentication module according to the 3rd external input information specifically for determining authentication grade;The processing module is specific For being used as the allocation plan to be selected using the corresponding Equations of The Second Kind allocation plan packet of the authentication grade that prestores.
CN201710355902.0A 2017-05-19 2017-05-19 Configuring management method and device for end application Pending CN107102881A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710355902.0A CN107102881A (en) 2017-05-19 2017-05-19 Configuring management method and device for end application

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710355902.0A CN107102881A (en) 2017-05-19 2017-05-19 Configuring management method and device for end application

Publications (1)

Publication Number Publication Date
CN107102881A true CN107102881A (en) 2017-08-29

Family

ID=59669015

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710355902.0A Pending CN107102881A (en) 2017-05-19 2017-05-19 Configuring management method and device for end application

Country Status (1)

Country Link
CN (1) CN107102881A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109670294A (en) * 2018-12-28 2019-04-23 Tcl移动通信科技(宁波)有限公司 Mobile terminal multifile sorting processing method, mobile terminal and storage medium

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102855286A (en) * 2012-08-07 2013-01-02 东莞宇龙通信科技有限公司 Mobile terminal and method for searching application programs in mobile terminal
CN102932518A (en) * 2012-10-30 2013-02-13 广东欧珀移动通信有限公司 User login/switching method and system, and mobile terminal
CN103870128A (en) * 2014-04-08 2014-06-18 联想(北京)有限公司 Control method of electronic equipment, control device and electronic equipment
CN104731611A (en) * 2013-12-24 2015-06-24 联芯科技有限公司 Mobile terminal operation mode configuring method and system based on application programs
CN106203015A (en) * 2016-06-30 2016-12-07 北京奇虎科技有限公司 The collocation method of application program, device and terminal unit
CN106201484A (en) * 2016-06-30 2016-12-07 北京奇虎科技有限公司 The collocation method of application program, device and terminal unit
CN106295296A (en) * 2016-08-04 2017-01-04 深圳市金立通信设备有限公司 A kind of startup method of application program and terminal

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102855286A (en) * 2012-08-07 2013-01-02 东莞宇龙通信科技有限公司 Mobile terminal and method for searching application programs in mobile terminal
CN102932518A (en) * 2012-10-30 2013-02-13 广东欧珀移动通信有限公司 User login/switching method and system, and mobile terminal
CN104731611A (en) * 2013-12-24 2015-06-24 联芯科技有限公司 Mobile terminal operation mode configuring method and system based on application programs
CN103870128A (en) * 2014-04-08 2014-06-18 联想(北京)有限公司 Control method of electronic equipment, control device and electronic equipment
CN106203015A (en) * 2016-06-30 2016-12-07 北京奇虎科技有限公司 The collocation method of application program, device and terminal unit
CN106201484A (en) * 2016-06-30 2016-12-07 北京奇虎科技有限公司 The collocation method of application program, device and terminal unit
CN106295296A (en) * 2016-08-04 2017-01-04 深圳市金立通信设备有限公司 A kind of startup method of application program and terminal

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109670294A (en) * 2018-12-28 2019-04-23 Tcl移动通信科技(宁波)有限公司 Mobile terminal multifile sorting processing method, mobile terminal and storage medium
CN109670294B (en) * 2018-12-28 2022-08-05 Tcl移动通信科技(宁波)有限公司 Mobile terminal multi-file classification processing method, mobile terminal and storage medium

Similar Documents

Publication Publication Date Title
KR100901238B1 (en) Methods and apparatus for dynamic user authentication using customizable context-dependent interaction across multiple verification objects
JP4939121B2 (en) Methods, systems, and programs for sequential authentication using one or more error rates that characterize each security challenge
EP3214798B1 (en) Identity authentication method and device
Conti et al. Mind how you answer me! Transparently authenticating the user of a smartphone when answering or placing a call
US8079079B2 (en) Multimodal authentication
CN104077516A (en) Biometric authentication method and terminal
US10795978B2 (en) Method and device for identity authentication
CN107862194B (en) A kind of method, device and mobile terminal of safety verification
CN107864144A (en) Obtain method and device, computer installation and the storage medium of dynamic password
CN105868970A (en) Authentication method and electronic device
CN108241999A (en) A kind of generation method of invoice information, apparatus and system
CN105868611A (en) Biological-information authentication method and device and mobile terminal
CN110399708A (en) A kind of dual-identity authentication method, apparatus and electronic equipment
CN104751350B (en) A kind of method for information display and terminal
CN108647510A (en) Application program access method and device
US20200201977A1 (en) Method for authenticating a first user and corresponding first device and system
CN107742073A (en) Information displaying method, device, computer installation and computer-readable recording medium
CN107102881A (en) Configuring management method and device for end application
Kadëna et al. Adoption of biometrics in mobile devices
CN108520186A (en) Record screen method, mobile terminal and computer readable storage medium
CN105871840B (en) A kind of certificate management method and system
CN109726636A (en) User ID authentication method and device, storage medium and electronic equipment
CN110516427A (en) Auth method, device, storage medium and the computer equipment of terminal user
CN110399046A (en) The processing method of candidate item, device, equipment and storage medium in input method
CN108563938A (en) The fingerprint authentication method and device of mobile terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20170829